JohnAnthony - DesignofanAccessControlModel...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
    Design of an Access Control Model  for Distributed Object System With  Mobile Code John Melvin Antony
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
    Motivation Security Agent Attacking Agent Platform/Host. Agent Platform/Host Attacking Agent. Agent Attacking Another Agent. Types of Attacks Masquerading. Denial of Service. Unauthorized Access.
Background image of page 2
    Challenges Who Implements Security Policies in  a Mobile environment. Access control At What Granularity? How Will Access control Policies be  Implemented Uniformly
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
    Background Access Control Approaches For Mobile Code Conditional Access Control Signed Code. Bond Security Pre-emptive Probe Access Control Embedded In Communication  Fabric Bond Ticket.
Background image of page 4
    Specific Objectives An Access Control Model For Mobile Code Which  Can Be Integrated Into Security Frameworks. Milestones
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 07/30/2011 for the course COP 5600 taught by Professor Staff during the Summer '11 term at University of Central Florida.

Page1 / 7

JohnAnthony - DesignofanAccessControlModel...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online